Losing access to your business’s data – even temporarily – is a nightmare worthy of a horror movie.
The basic function of data backup tools is to create copies of your data and store them in a safe place. If something goes wrong, recovery tools will use these copies to restore your lost files.
So, if your business already uses backup and recovery tools, you would think your data is safe… but this isn’t necessarily true.
A new report shows that some backup tools aren’t as reliable as they should be. In fact, a third of all data losses are caused by backup-related issues. When people try to recover data, they discover it’s been lost, corrupt or was never backed up in the first place.
One of the biggest threats to businesses right now is ransomware. This is a type of malicious software (or "malware") that locks you out of your files unless you pay a ransom to regain access.
The report found that half of businesses using backup tools still ended up paying ransoms to retrieve their files, because it was faster than trying to use their own recovery tools. Even worse? Only a small number of businesses that paid ransoms were able to fully recover their data.
Often, it’s because they haven’t been set up properly. And even when they are, they still need to be verified regularly to make sure they are still backing up your files.
Also, older backup and recovery tools can’t keep up with today’s sophisticated cyber-attacks. Ransomware will target the backup files as well as the production files to make it impossible to recover them. Backup files need to be properly encrypted and separated from the production data. Setting up and maintaining a reliable backup system is straightforward if you have been doing it for 25 years. IT experts (like us) can make sure your tools are running correctly every day. Every single day our backups are verified to ensure your system can be recovered no matter the disaster situation.
We put extra safeguards in place such as continuous data protection (CDP). CDP continuously saves changes to your files, allowing you to go back in time and restore your data as it was just before an attack or loss.
You may think because your files are saved in Microsoft, Google, DropBox or any number of other cloud services your files are safe, and Microsoft is taking care of the backups. This is not the case, and you still need a separate encrypted and secure backup. Whether your files are all in the cloud, on-premises or a combination of the two, backup is critical.
This is something we do for businesses like yours every day. Reach out if you are concerned about your existing backup solution or if you have any questions. Contact us at (319) 535-5350 or [email protected] to setup an appointment.
Picture this: You’re having a busy day at work when the phone rings. On the other end of the line is someone claiming to be from Microsoft Teams support. They sound professional, helpful even. But before you follow their instructions, ask yourself: could this be a scam?
The latest trend in cybercrime involves scammers posing as “help desk” staff to trick employees into granting access to their devices. It’s part of a larger ransomware strategy designed to lock businesses out of their own data until they cough up a hefty ransom. These attacks are devastating and growing in sophistication.
Recently, a notorious cybercrime group took this scam to a whole new level. Here’s how their operation works:
But it doesn’t stop there. These scammers are also leveraging Microsoft Teams to gain trust. They’ll create fake Teams accounts with usernames like “Help Desk” and domains such as “securityadminhelper.onmicrosoft.com.” Then, they send one-on-one messages to employees, claiming they need access to their devices to resolve an issue.
Ransomware attacks are more than just an inconvenience; they’re a direct threat to your operations, reputation, and bottom line. Here’s what’s at stake:
Education and vigilance are your first lines of defense. Share this information with your team and encourage a healthy skepticism toward unsolicited calls or messages. Here are a few specific steps to safeguard your business:
Ransomware is serious business, but it doesn’t have to become your business’s problem. By staying informed and proactive, you can protect your operations, your customers, and your reputation. If you’re unsure whether your systems are as secure as they could be, we’re here to help. Get in touch today to discuss your cybersecurity strategy and ensure your business is prepared for whatever comes next.
Ever feel overwhelmed by the maze of chats, channels, and notifications in Microsoft Teams? Well, here’s the good news: Microsoft’s rolling out an update to help streamline things.
The update will create a simpler workspace that’s easier to navigate – grouping everything in one location under the Chat menu. Think of it as a central hub where all your key conversations and notifications live.
The update also includes a new “@mentions” view that gathers all your direct messages and important mentions in one place. This will make it easier to catch up on messages you’re tagged in, helping you to make sure important notifications don’t slip through the cracks.
Teams will also be getting improved filters and controls. This will let you do things like filter out less urgent notifications, as well as create custom sections to keep your chats, channels, and meetings organized by project or topic.
Another great feature being introduced is a new “favorites” section, allowing you to pin your top chats and channels for quick access.
Also, threaded conversations are expected to arrive some time in mid-2025. This will mean that replies get grouped together in the same thread, making it easier to follow discussions without losing track of previous messages.
All these improvements are coming to desktop, Android, and iOS – so your team will be able to stay on top of things no matter where they are.
If you’re not already using Teams to keep communication flowing in your business, now’s a great time to start. We can help with that, get in touch.
AI chatbots have taken the world by storm in recent months. We’ve been having fun asking ChatGPT questions, trying to find out how much of our jobs it can do, and even getting it to tell us jokes.
But while lots of people have been having fun, cyber criminals have been powering ahead and finding ways to use AI for more sinister purposes.
They’ve worked out that AI can make their phishing scams harder to detect – and that makes them more successful.
ChatGPT Bad Jokes
Our advice has always been to be cautious with emails. Read them carefully. Look out for spelling mistakes and grammatical errors. Make sure it’s the real deal before clicking any links.
And that’s still excellent advice.
But ironically, the phishing emails generated by a chatbot feel more human than ever before – which puts you and your people at greater risk of falling for a scam. So, we all need to be even more careful.
Crooks are using AI to generate unique variations of the same phishing lure. They’re using it to eradicate spelling and grammar mistakes, and even to create entire email threads to make the scam more plausible.
Security tools to detect messages written by AI are in development, but they’re still a way off.
When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details, which can affect your security login processes.
It’s easy to overlook. You’ll get around to it later, right?
But unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you’re paying for old subscriptions you no longer need.
A recent report found that almost half of businesses had accounts that were no longer actively managed, which can undermine your security login protocols.
If you’ve forgotten about an account, you’re not monitoring it. And this leaves your business vulnerable to attacks.
These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.
So, what do you need to do?
Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive) to avoid security login issues.
The same goes for any software or service that you’ve stopped using in your business. You might not realize you’re still paying for a service you haven’t touched in months – or even years.
Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.
If you’re not sure where to start, let us help you perform a security review and make sure you’re not leaving your business exposed to unnecessary threats. Contact us at (319) 535-5350 or [email protected] to setup an appointment.
On August 6th, 2024, most, if not all, of the US population’s personal information was leaked by hackers that stole the information from National Public Data back in April. According to NPD’s website, they provide criminal records, background checks and more; the more may now include helping hackers take over your identity.
What does this mean for the average American? Not a lot really. So many breaches have happened over the past several years that almost all our data is and was already for sale on the Dark Web. The only difference here is that the hacking group responsible, USDoD, published the complete list and made it available for free.
This will certainly lead to even more scammers and hackers using this data for nefarious purposes. The data leaked included name, mailing address, Social Security Numbers, and date of birth. This data can easily be combined with other hacked data sources to connect email addresses, passwords, and other sensitive information to create what hackers call a FULLZ, slang for “full information” on you.
Should you do anything to better protect yourself from these hackers and scammers? 100% YES. The top three things you should do, in priority, are as follows.
You should freeze your credit today. It keeps a scammer from being able to take out credit in your name, which is the most damaging aspect of identity theft. There is no reason not to do it. The three primary credit reporting bureaus are Equifax, Experian, and TransUnion. They all do this for free and it is easy to unfreeze and refreeze when you want to buy a new car, open a credit card, or refinance your house.
If you don’t want to spend any money, there are free ones available in Google Chrome or Apple Keychain. Better yet, spend a few bucks and buy 1Password, Bitwarden or Keeper. Wired has a great article on the best options for free and paid along with reasons to use a paid version.
This sounds counter intuitive, but for every financial service you have, banking, brokerage, 401K, 529, etc., you need to sign up for the online service. It is much easier for a hacker to sign up for these online services than it is to crack, steal or otherwise connive you out of an existing username and password. Especially if you use a password manager and every password for every login is different and 24 random characters. You only need to remember one password.
Bottom line you need to take personal responsibility for securing your identity regardless of what the next big breach is, and there will be another. It is not a question of if, but when.
Image: This Photo by Unknown Author is licensed under CC BY-NC-ND
In the ever-evolving landscape of technology, the role of the system administrator within small and medium-sized businesses (SMBs) has undergone a massive transformation. A decade ago, the one “tech guy" sitting alone in the server room could manage almost all aspects of an organization’s IT infrastructure. Today, the complexity and scale of IT systems demand a more specialized approach. This shift has not only reshaped the role of the system administrator but also the strategies SMBs must adopt to manage their technological needs effectively.
The "Jack of All Trades" Era
Traditionally, system administrators in SMBs were generalists, often single-handedly managing a wide array of IT responsibilities—from setting up and maintaining network operations, managing server environments, to overseeing security protocols and software deployments. They were the go-to problem solvers, adept at patching together solutions and making the most out of limited resources. The scope of their role required broad, but not necessarily deep, knowledge across various IT domains.
My First Sys Admin Role
The first Systems Administrator role for me was within a financial services company of forty employees. This was before compliance and cybersecurity concerns. Their Internet connection was delivered via a bank of dial up modems. Email was new and hackers couldn’t use Bitcoin to ransom the entire system. This was over 25 years ago.
Bitcoin Changed Everything
Once Bitcoin became mainstream, at least within the hacker community, the security and IT landscape was changed forever. Bitcoin was initially released on January 3, 2009, but wasn’t widely used until around 2012. With Bitcoin, hackers could start getting paid anonymously anywhere in the world. This led to the explosion of cybercrime and exponentially increased the need for specialized talents within technology.
Transition to Specialization
Over the past decade, several key factors have driven the need for more specialized IT roles within SMBs:
1. Technological Complexity
The IT landscape has grown exponentially in complexity with advancements in cloud computing, big data, artificial intelligence, and machine learning. Technologies that were once optional or considered "luxuries" for SMBs have become necessities in maintaining competitive advantage and operational efficiency.
2. Security Concerns
With the increase in cyber threats, security has become a top priority for businesses of all sizes. The growing sophistication of cyber-attacks requires expertise not just in preventive measures but also in rapid response and recovery strategies. This has led to the need for roles specifically focused on cybersecurity within SMBs.
3. Regulatory Compliance
Changes in regulations such as GDPR, HIPAA, or PCI-DSS have significant implications for how data is managed and protected. Compliance requires specialized knowledge to navigate the legal and technical requirements, pushing the system administrator role toward specialization.
4. Cloud and Hybrid Environments
The shift towards cloud-based services and hybrid environments demands a deep understanding of cloud service models, integration, and management. System administrators must now possess specific skills in managing these environments, which often include multiple service providers and platforms.
New Skills and Roles
As a result of these changes, the system administrator’s role is branching into more specialized domains:
Implications for SMBs
For SMBs, this transition means rethinking how they staff and manage their IT departments. While larger organizations might afford the luxury of several specialized roles, SMBs often need to find a balance. This may involve:
The era of the "one tech guy" who could do it all is becoming a relic of the past for SMBs. As technology continues to advance at a breakneck pace, the role of IT professionals within these organizations is becoming more specialized. SMBs must adapt to this reality by either developing their own expertise or strategically outsourcing, ensuring that their businesses can not only survive but thrive in the digital age. The future of SMB IT management is specialized, nuanced, and undeniably complex, but with the right strategy, also tremendously rewarding.
Fifty-six percent of Manufacturers Surveyed Report Being Hit by Ransomware
A silent threat looms that can shut down your operation in a matter of minutes - ransomware. I have seen the devastating effects firsthand too many times. About half of our new clients become clients after they have been hit by a cyber-attack. Cybersecurity can no longer be a footnote in operational strategies or worse, ignored completely; it should be front and center.
Ransomware is a type of malicious software designed to encrypt data and block access to a computer system until a ransom is paid. Cybersecurity giant Sophos completed a survey of manufacturers earlier this year and the statistics are truly scary:
When you have been hit by ransomware it feels like someone has broken into your house, rummaged around, and stolen from you. The most unnerving part is not knowing if they are still in the house and what is going to happen next.
The repercussions of a ransomware attack go far beyond the ransom itself. Once the files are encrypted your entire operation can be shut down. The average time to recover from an attack is 22 days. Imagine the impact of being shut down for 22 days, it is devasting.
Responses like, “It can’t happen to us” that turns into “Why would they attack us?” are common. Companies in the Midwest (especially smaller companies) don’t think they are a target. If you have an Internet connection and a bank account, you are a target.
While the notion of doing the "bare minimum" in cybersecurity might have been sufficient a decade ago, today's threats demand a more robust approach. Achieving a baseline cybersecurity posture will neutralize many of the common vulnerabilities that ransomware exploits.
Here is how you can get ahead of the next attack:
Ensure that all software, especially operating systems and applications used in production and operations, are regularly updated with the latest patches. No device should be more than 14 days out of date. This alone can close off many of the security gaps that ransomware attackers exploit and prevent nearly a quarter of all attacks.
24% of Attacks on Manufacturers Reported Exploited Vulnerabilities as the Root Cause
Inventory sounds like it should be a no brainer, but a shocking number of companies have no record of exactly who has what devices. If you don’t know what you have, you can’t keep every device up to date.
2. Employee Education and Awareness Training
Human error often serves as an entry point for ransomware. Regular training sessions for employees on recognizing phishing attempts and practicing safe browsing and email habits are crucial.
3. Access Controls, User Permissions and Passwords
Limiting user access on a need-to-know basis minimizes the potential impact of a ransomware attack. If an infection occurs, it's contained to fewer areas, making it easier to control and resolve.
27% Reported Compromised Credentials as the Root Cause
4. Secure Backups
Regular, secure, and offsite backups can be a lifesaver in a ransomware incident. Even if data is held hostage, companies can restore their systems with minimal downtime. The critical piece is offsite and secure.
5. Incident Response Planning
Having a clear, tested incident response plan ensures that if an attack occurs, the organization can react quickly and effectively, reducing potential damage and restoring operations more rapidly.
6. Accountability
Accountability is critical when it comes to properly securing your network. Whether you are the business owner, a board member, or the person tasked with managing IT, you need a single report that shows that cybersecurity is being managed to the correct specifications.
The growing threat of ransomware cannot be underestimated, and the statistics speak for themselves. With 56% of manufacturers reporting being hit by ransomware and the average recovery cost exceeding a million dollars, it is clear you can’t ignore this problem.
The impact of a ransomware attack extends far beyond the financial cost. It disrupts operations, compromises sensitive data, and creates a sense of vulnerability and unease. No company is immune to these threats, and it's essential to take proactive measures to protect your organization.